What occurs when Bypass Under Load activated?
A . Packets are forwarded to the destination without checking the packets against the firewall rule base
B . Packets are forwarded to the destination without performing IPS analysis
C . To still ensure a minimum level of data integrity, the system revert to the use of MD5 instead of SHA-1, since former produces an output smaller than the latter
D . The amount of the state table entries is decreased according to the LRU (least recently used) algorithm